Analysis
-
max time kernel
136s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2023, 19:47
Static task
static1
Behavioral task
behavioral1
Sample
976d4e60dcc6d961f976a26e0bd6a78bb06e951e036a9aa4ef660bebade561db.xlsx
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
976d4e60dcc6d961f976a26e0bd6a78bb06e951e036a9aa4ef660bebade561db.xlsx
Resource
win10v2004-20230220-en
General
-
Target
976d4e60dcc6d961f976a26e0bd6a78bb06e951e036a9aa4ef660bebade561db.xlsx
-
Size
53KB
-
MD5
ff9d08fe29e881d2b208263ed8ca9db9
-
SHA1
fe4158b5c852eb9884fb41982c44e3d7803987ab
-
SHA256
976d4e60dcc6d961f976a26e0bd6a78bb06e951e036a9aa4ef660bebade561db
-
SHA512
4cd084f3fc98bf4c44a263f068552afdebfbf27d020ed1405aa6a4b8e096db0c293162f518addb52fa0e2648276405fdc1ba2709b090da3655e071e370359ef8
-
SSDEEP
1536:4Dezo3gVLt51M7Ar3r7/WobSCuW6ghtjQDYLh:4DOh5t5FrbqqSrWN6Yl
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3280 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3280 EXCEL.EXE 3280 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3280 EXCEL.EXE 3280 EXCEL.EXE 3280 EXCEL.EXE 3280 EXCEL.EXE 3280 EXCEL.EXE 3280 EXCEL.EXE 3280 EXCEL.EXE 3280 EXCEL.EXE 3280 EXCEL.EXE 3280 EXCEL.EXE 3280 EXCEL.EXE 3280 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\976d4e60dcc6d961f976a26e0bd6a78bb06e951e036a9aa4ef660bebade561db.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3280